SlideShare a Scribd company logo
Wednesday, February 12, 2020, NISO Webinar
NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Welcome!
There are two components to this virtual conference:
1. The online presentation:
Congratulations, you have logged in successfully! You will see the slides for today’s event
and be able to ask questions via the Zoom webinar interface.
2. The audio portion:
Zoom promises a higher quality of audio over VOIP networks so use of your computer
speakers may be a more positive option than in the past.
Alternatively, you can
Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656
International Callers should consult Zoom Support for the appropriate number.
Technical assistance is available by:
Contacting support.zoom.us. (Live Chat)
NISO’s webinar id today is: 177-785-995
Some Frequently Asked
Questions
Will Slides Be Made Available Following This Session?
Yes!
Is This Segment Being Recorded
So That I Can View It Later?
Yes!
You will receive an e-mail with links & information on how to
access those links within 24-48 hours of today’s event.
Keep Current with NISO
Educational Events
March 2020
Two-Part Webinar: Labor and Capacity and Building Data Science Skills
• Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm –
2:30pm
• Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm –
2:30pm
Virtual Conference: Researcher Behaviors and the Impact of Technology
Wednesday, March 25, 12:00 Noon – 4:00pm
April 2020
NFAIS Forethought: Artificial Intelligence, Planning for Implementation
Wednesday, April 8, 1:00pm – 2:30pm
Virtual Conference: Making Content Accessible: How Can Publishers and Libraries
Better Satisfy the Obligation
Wednesday, April 15, 12:00 Noon – 4:00pm
NISO Plus Conference Now Sold Out!
Baltimore, MD, Feb 23-25, 2020
The Lord Baltimore Hotel
https://niso.plus
Check Out the Content on IO!
https://www.niso.org/niso-io
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Your Questions
Please submit your questions and
concerns for discussion by our roundtable
participants in the Q&A panel of the Zoom
interface
NISO Webinar
NFAIS Forethought
Cybersecurity: Protecting Your Internal Systems
Wednesday, February 12, 2019, 1:00 am – 2:30 pm
Roundtable Participants
• Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic
• Blake Carver, Senior Systems Administrator, LYRASIS
• Christian Kohl, Principal, Kohl Consulting
• Hong Ma, Head, Library Systems, Loyola University of Chicago
• Wayne Strickland, Acting Associate Director at Department of Commerce,
National Technical Information Service
• Becky Yoose, Principal, LDH Consulting Services
8
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
As an opener, can we define “cybersecurity”
and what it covers?
9
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What might be problematic vocabulary when discussing
cybersecurity in a cross-sector environment?
• Hostile users, threat actors
• Threat modeling
• Hacking / Cracking
• Breach vs. leak vs. unauthorized access
10
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
In your respective roles as consultants, IT people
and administrators, what are your thoughts on
balancing a desire for transparency and the need
for some degree of shielding of a system’s
defenses?
11
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How much transparency can or should be
expected of vendors?
12
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
What are some of the differences in building in
cybersecurity protections at an institutional level
vs building security at web-scale? Is that
nuance sufficiently recognized?
13
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
From a practical standpoint, the information community likely
encounters issues of security arising from
• Backwards compatibility
• Need for cost controls.
• Prioritizing an alternate social good
• Introduction of smart technology (lightbulbs, etc.) into
buildings, etc.
How might stake-holders (content providers, platform providers,
librarians) be factoring those constraints into their thinking about
and collaboration on cybersecurity?
14
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Are utility, cost and convenience truly inimical to
the needs of cybersecurity?
What are the trade-offs?
15
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Who ultimately holds responsibility for ensuring
protected systems? Is it a user issue, a provider
vendor issue, or an institutional issue?
16
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
How might stakeholders adequately convey to users
the risks, the responsibilities, etc. associated with
protective measures surrounding a system?
How do we convey to users that security may be more
important than features?
17
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Question
Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is
a bottom up approach. Standardization is a strategic tool. We need to commit to
create standards that meet market needs, consumer needs and global needs.”
Bringing that down into the context of the information community,
whose/which/what set of needs are currently under threat? Whose needs
should be articulated and/or prioritized?
• How might we determine appropriate priorities?
• What things have the greatest potential for harm?
How can NISO help stakeholders collaborate to resolve the various existing
problems?
NISO Webinar
Cybersecurity: Protecting Your Internal Systems
NISO Webinar • February 12, 2020
Questions & Discussion
Slides will be posted to the NISO website following the close
of today’s segment:
https://www.niso.org/events/2020/02/nfais-forethought-
cybersecurity-protecting-your-internal-systems
Thanks to all of our attendees for joining us today.
We look forward to hearing from you!
THANK YOU

More Related Content

What's hot

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
Deploy360 Programme (Internet Society)
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
National Information Standards Organization (NISO)
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
Abzetdin Adamov
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
Esteban Romero Frías
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Information infrastructures
Information infrastructuresInformation infrastructures
Information infrastructures
Aleksandra Lazareva
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
Mohammad Emrul Hassan Emon
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
FIA2010
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Jason Hong
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Bloxx
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Thanuja Seneviratne
 
Technology & Social work
Technology & Social workTechnology & Social work
Technology & Social work
manoj_socialworks
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
Prof. Jacques Folon (Ph.D)
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
Kim Jensen
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Marien Fajardo
 

What's hot (20)

"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Information infrastructures
Information infrastructuresInformation infrastructures
Information infrastructures
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
Jim Clarke, Waterford Institute of Technology, IRELAND: Session Introduction
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABEStudi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Technology & Social work
Technology & Social workTechnology & Social work
Technology & Social work
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020

NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
National Information Standards Organization (NISO)
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
hdicapitalarea
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?
lisbk
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
Industrial Internet Consortium
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
Courtney King
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
mamathajagarlamudi2
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
BDPA Education and Technology Foundation
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 Technologies
Aspire Systems
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board Deck
Richard Smiraldi
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
Jim Kaplan CIA CFE
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
Net at Work
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
Marketing Team
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
Copperberg
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
Aviva Spectrum™
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
Dale Butler
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
APNIC
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
Deploy360 Programme (Internet Society)
 

Similar to NISO Roundtable Discussion, Cybersecurity, February 12 2020 (20)

NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
NISO Roundtable Discussion, "Teaching and Learning Online: Innovation Under P...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?Web 2.0: How Should IT Services and the Library Respond?
Web 2.0: How Should IT Services and the Library Respond?
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Building Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 TechnologiesBuilding Software Solutions Using Web 2.0 Technologies
Building Software Solutions Using Web 2.0 Technologies
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board Deck
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
AITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformationAITI Smart Future Forum: Cybersecurity and digital transformation
AITI Smart Future Forum: Cybersecurity and digital transformation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 

More from National Information Standards Organization (NISO)

Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
National Information Standards Organization (NISO)
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
National Information Standards Organization (NISO)
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
National Information Standards Organization (NISO)
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
National Information Standards Organization (NISO)
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
National Information Standards Organization (NISO)
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
National Information Standards Organization (NISO)
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
National Information Standards Organization (NISO)
 

More from National Information Standards Organization (NISO) (20)

Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 

Recently uploaded

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 

Recently uploaded (20)

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 

NISO Roundtable Discussion, Cybersecurity, February 12 2020

  • 1. Wednesday, February 12, 2020, NISO Webinar NFAIS Forethought: Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Welcome! There are two components to this virtual conference: 1. The online presentation: Congratulations, you have logged in successfully! You will see the slides for today’s event and be able to ask questions via the Zoom webinar interface. 2. The audio portion: Zoom promises a higher quality of audio over VOIP networks so use of your computer speakers may be a more positive option than in the past. Alternatively, you can Listen in via Telephone: Dial in the U.S. +1 669 900 6833 or +1 646 558 8656 International Callers should consult Zoom Support for the appropriate number. Technical assistance is available by: Contacting support.zoom.us. (Live Chat) NISO’s webinar id today is: 177-785-995
  • 2. Some Frequently Asked Questions Will Slides Be Made Available Following This Session? Yes! Is This Segment Being Recorded So That I Can View It Later? Yes! You will receive an e-mail with links & information on how to access those links within 24-48 hours of today’s event.
  • 3. Keep Current with NISO Educational Events March 2020 Two-Part Webinar: Labor and Capacity and Building Data Science Skills • Labor and Capacity, Research Data Management, Wednesday, March 11, 1:00pm – 2:30pm • Labor and Capacity, Building Data Science Skills, Wednesday, March 18, 1:00pm – 2:30pm Virtual Conference: Researcher Behaviors and the Impact of Technology Wednesday, March 25, 12:00 Noon – 4:00pm April 2020 NFAIS Forethought: Artificial Intelligence, Planning for Implementation Wednesday, April 8, 1:00pm – 2:30pm Virtual Conference: Making Content Accessible: How Can Publishers and Libraries Better Satisfy the Obligation Wednesday, April 15, 12:00 Noon – 4:00pm
  • 4. NISO Plus Conference Now Sold Out! Baltimore, MD, Feb 23-25, 2020 The Lord Baltimore Hotel https://niso.plus
  • 5. Check Out the Content on IO! https://www.niso.org/niso-io
  • 6. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Your Questions Please submit your questions and concerns for discussion by our roundtable participants in the Q&A panel of the Zoom interface
  • 7. NISO Webinar NFAIS Forethought Cybersecurity: Protecting Your Internal Systems Wednesday, February 12, 2019, 1:00 am – 2:30 pm Roundtable Participants • Daniel Ayala, Founder, CISO/Chief Privacy Officer, Secratic • Blake Carver, Senior Systems Administrator, LYRASIS • Christian Kohl, Principal, Kohl Consulting • Hong Ma, Head, Library Systems, Loyola University of Chicago • Wayne Strickland, Acting Associate Director at Department of Commerce, National Technical Information Service • Becky Yoose, Principal, LDH Consulting Services
  • 8. 8 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question As an opener, can we define “cybersecurity” and what it covers?
  • 9. 9 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What might be problematic vocabulary when discussing cybersecurity in a cross-sector environment? • Hostile users, threat actors • Threat modeling • Hacking / Cracking • Breach vs. leak vs. unauthorized access
  • 10. 10 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question In your respective roles as consultants, IT people and administrators, what are your thoughts on balancing a desire for transparency and the need for some degree of shielding of a system’s defenses?
  • 11. 11 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How much transparency can or should be expected of vendors?
  • 12. 12 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question What are some of the differences in building in cybersecurity protections at an institutional level vs building security at web-scale? Is that nuance sufficiently recognized?
  • 13. 13 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question From a practical standpoint, the information community likely encounters issues of security arising from • Backwards compatibility • Need for cost controls. • Prioritizing an alternate social good • Introduction of smart technology (lightbulbs, etc.) into buildings, etc. How might stake-holders (content providers, platform providers, librarians) be factoring those constraints into their thinking about and collaboration on cybersecurity?
  • 14. 14 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Are utility, cost and convenience truly inimical to the needs of cybersecurity? What are the trade-offs?
  • 15. 15 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Who ultimately holds responsibility for ensuring protected systems? Is it a user issue, a provider vendor issue, or an institutional issue?
  • 16. 16 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question How might stakeholders adequately convey to users the risks, the responsibilities, etc. associated with protective measures surrounding a system? How do we convey to users that security may be more important than features?
  • 17. 17 NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Question Tweet emerging from a recent cybersecurity conference: “Cybersecurity policy is a bottom up approach. Standardization is a strategic tool. We need to commit to create standards that meet market needs, consumer needs and global needs.” Bringing that down into the context of the information community, whose/which/what set of needs are currently under threat? Whose needs should be articulated and/or prioritized? • How might we determine appropriate priorities? • What things have the greatest potential for harm? How can NISO help stakeholders collaborate to resolve the various existing problems?
  • 18. NISO Webinar Cybersecurity: Protecting Your Internal Systems NISO Webinar • February 12, 2020 Questions & Discussion Slides will be posted to the NISO website following the close of today’s segment: https://www.niso.org/events/2020/02/nfais-forethought- cybersecurity-protecting-your-internal-systems
  • 19. Thanks to all of our attendees for joining us today. We look forward to hearing from you! THANK YOU